What is the difference between persistent VDI and non-persistent VDI, and how do they affect storage resources...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Virtual desktops are divided into two types: persistent and stateless. In persistent VDI, the desktops contain the entire configuration and customization performed by the user as the desktop is being used. Storage for persistent desktops is typically a separate logical drive that is mapped to the Documents folder for the user. This means that user data storage is integrated into the desktop virtual machine setup. Clearly, this ties all file performance and data access characteristics to the underlying storage used to provide the virtual machine.
In non-persistent VDI, or stateless VDI, all user configuration and user data is stored on separate hardware that is accessed remotely, for instance, as a network share via CIFS. The stateless approach has a number of advantages. By separating OS from user data, each can be managed separately for capacity, reducing the risk of user data growth affecting all VDI deployments. It also enables both data types to be treated independently from a performance perspective. This provides the opportunity to place user data on lower-cost storage hardware. Finally, the stateless option results in fewer requirements for backup as only the virtual machine master and user data need to be backed up. The recovery of stateless environments is therefore much quicker.
Dig Deeper on Virtualization Strategy
Related Q&A from Chris Evans
Using Oracle Recovery Manager for database backup and restore? Explore the Oracle backup script and command process, with options for specific ...continue reading
While ransomware remains a top threat, it is not the only cybersecurity problem data backup admins need to keep on their radar. Here are three more ...continue reading
A layered protection strategy works best against ransomware. Organizations must be diligent about backing up data, monitoring suspicious activity and...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.